Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Walk Through Eight C2 Tools in 50 Minutes

RSA Conference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore eight command and control (C2) tools through comprehensive analysis of their communication methods and detection strategies in this 43-minute conference talk. Examine Metasploit, Mythic, Merlin, CobaltStrike, Sliver, BruteRatel, DropboxC2C, and SaucePot C2 to understand how these tools operate and how security professionals can identify their presence. Learn behavior-based detection methods, network traffic analysis techniques, and machine learning approaches for identifying C2 communications. Discover practical defense techniques that can be implemented to strengthen organizational cyber resilience against these sophisticated threat actor tools. Gain insights from a principal threat researcher's perspective on the evolving landscape of command and control infrastructure and the corresponding defensive measures needed to combat modern cyber threats.

Syllabus

Walk Through Eight C2 Tools in 50 Mins

Taught by

RSA Conference

Reviews

Start your review of Walk Through Eight C2 Tools in 50 Minutes

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.